/freebsd/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_smime.c | 216 STACK_OF(X509) *signers; in PKCS7_verify() 264 signers = PKCS7_get0_signers(p7, certs, flags); in PKCS7_verify() 265 if (signers == NULL) in PKCS7_verify() 275 for (k = 0; k < sk_X509_num(signers); k++) { in PKCS7_verify() 276 signer = sk_X509_value(signers, k); in PKCS7_verify() 360 signer = sk_X509_value(signers, i); in PKCS7_verify() 378 sk_X509_free(signers); in PKCS7_verify() 385 STACK_OF(X509) *signers; in STACK_OF() 411 if ((signers = sk_X509_new_null()) == NULL) { in STACK_OF() 431 sk_X509_free(signers); in STACK_OF() [all …]
|
/freebsd/crypto/openssl/apps/ |
H A D | smime.c | 22 static int save_certs(char *signerfile, STACK_OF(X509) *signers); 611 STACK_OF(X509) *signers; in smime_main() 618 signers = PKCS7_get0_signers(p7, other, flags); in smime_main() 619 if (!save_certs(signerfile, signers)) { in smime_main() 624 sk_X509_free(signers); in smime_main() 679 static int save_certs(char *signerfile, STACK_OF(X509) *signers) in save_certs() argument 689 for (i = 0; i < sk_X509_num(signers); i++) in save_certs() 690 PEM_write_bio_X509(tmp, sk_X509_value(signers, i)); in save_certs()
|
H A D | cms.c | 24 static int save_certs(char *signerfile, STACK_OF(X509) *signers); 1178 STACK_OF(X509) *signers = CMS_get0_signers(cms); in cms_main() 1180 if (!save_certs(signerfile, signers)) { in cms_main() 1186 sk_X509_free(signers); in cms_main() 1280 static int save_certs(char *signerfile, STACK_OF(X509) *signers) in save_certs() argument 1289 for (i = 0; i < sk_X509_num(signers); i++) in save_certs() 1290 PEM_write_bio_X509(tmp, sk_X509_value(signers, i)); in save_certs()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | CMS_get0_SignerInfos.pod | 41 CMS_SignerInfo_set1_signer_cert() sets the signers certificate of B<si> to 47 signers certificates using any appropriate technique when the simpler method 59 there are no signers this is not a problem in practice because the only 66 are no signers or an error occurs.
|
H A D | CMS_sign.pod | 47 the signers certificate can be obtained by other means: for example a 85 output to which additional signers and capabilities can be added before 107 B<CMS_PARTIAL> flag set. Then one or more signers can be added using the
|
H A D | CMS_add1_signer.pod | 42 are not appropriate. For example if multiple signers or non default digest 64 the signers certificate can be obtained by other means: for example a
|
H A D | PKCS7_sign_add_signer.pod | 38 not appropriate. For example if multiple signers or non default digest 57 signers certificate can be obtained by other means: for example a previously
|
H A D | PKCS7_sign.pod | 71 which additional signers and capabilities can be added before finalization. 86 NULL if the B<PKCS7_PARTIAL> flag is set. One or more signers can be added
|
H A D | CMS_verify.pod | 117 CMS_get0_signers() returns all signers or NULL if an error occurred.
|
H A D | PKCS7_verify.pod | 114 PKCS7_get0_signers() returns all signers or NULL if an error occurred.
|
/freebsd/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 94 STACK_OF(X509) *signers = NULL; in TS_RESP_verify_signature() 125 signers = PKCS7_get0_signers(token, certs, 0); in TS_RESP_verify_signature() 126 if (!signers || sk_X509_num(signers) != 1) in TS_RESP_verify_signature() 128 signer = sk_X509_value(signers, 0); in TS_RESP_verify_signature() 162 sk_X509_free(signers); in TS_RESP_verify_signature()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-smime.pod.in | 102 Resign a message: take an existing message and one or more new signers. 185 Do not verify the signers certificate of a signed message. 189 Do not do chain verification of signers certificates; that is, do not 200 signed message, but the verifier must have a copy of the signers certificate 236 the signers certificates. 243 verified then the signers certificates will be written to this file if the 268 then many S/MIME mail clients check the signers certificate's email 309 will verify multiple signers on received messages. Some S/MIME clients 310 choke if a message contains multiple signers. It is possible to sign 358 the signers certificate [all...] |
H A D | openssl-cms.pod.in | 196 Resign a message: take an existing message and one or more new signers. 446 the signers certificates. 467 signed message but the verifier must have a copy of the signers certificate 505 If a message has been verified successfully then the signers certificate(s) 530 Do not verify the signers certificate of a signed message. 583 then many S/MIME mail clients check the signers certificate's email 643 will verify multiple signers on received messages. Some S/MIME clients 644 choke if a message contains multiple signers. It is possible to sign 739 the signers certificates. 783 Create a signed message with two signers, use key identifier:
|
H A D | openssl-ocsp.pod.in | 236 signers certificate. With this option the signers certificate must be specified 247 Don't verify the OCSP response signers certificate at all. Since this 262 Don't perform any additional checks on the OCSP response signers certificate. 263 That is do not make any checks to see if the signers certificate is authorised
|
H A D | openssl-crl2pkcs7.pod.in | 84 The output file is a PKCS#7 signed data structure containing no signers and
|
/freebsd/contrib/unbound/smallapp/ |
H A D | unbound-anchor.c | 1682 STACK_OF(X509)* signers = PKCS7_get0_signers(p7, NULL, 0); in STACK_OF() 1686 sk_X509_free(signers); in STACK_OF() 1689 if(!signers) { in STACK_OF() 1694 for(i=0; i<sk_X509_num(signers); i++) { in STACK_OF() 1696 sk_X509_value(signers, i)); in STACK_OF() 1716 sk_X509_value(signers, i), NID_key_usage, -1); in STACK_OF() 1719 sk_X509_value(signers, i), ku_loc); in STACK_OF() 1745 usage = get_usage_of_ex(sk_X509_value(signers, i)); in STACK_OF() 1753 sk_X509_push(validsigners, sk_X509_value(signers, i)); in STACK_OF() 1755 sk_X509_free(signers); in STACK_OF()
|
/freebsd/crypto/openssl/doc/ |
H A D | README.md | 7 PGP fingerprints of authorised release signers
|
/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 570 STACK_OF(X509) *signers = NULL; in STACK_OF() 579 if (!ossl_x509_add_cert_new(&signers, si->signer, in STACK_OF() 581 sk_X509_free(signers); in STACK_OF() 586 return signers; in STACK_OF()
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | hxtool.c | 185 hx509_certs signers = NULL; in cms_verify_sd() local 289 store, &type, &c, &signers); in cms_verify_sd() 304 if (signers == NULL) { in cms_verify_sd() 308 hx509_certs_iter_f(context, signers, hx509_ci_print_names, stdout); in cms_verify_sd() 314 hx509_certs_free(&signers); in cms_verify_sd()
|
H A D | hx509_err.et | 45 error_code SIGNER_NOT_FOUND, "Couldn't find signers certificate"
|
/freebsd/crypto/openssl/crypto/err/ |
H A D | openssl.txt | 347 CMS_R_NO_SIGNERS:135:no signers 937 PKCS7_R_NO_SIGNERS:142:no signers
|
/freebsd/contrib/ldns/ |
H A D | Changelog | 412 * Canonicalize the signers name rdata field in RRSIGs when signing
|
/freebsd/crypto/openssh/ |
H A D | ChangeLog | 6365 initial list of allowed signers
|
/freebsd/crypto/openssl/ |
H A D | CHANGES.md | 9843 * New -resign option to smime utility. This adds one or more signers 9850 create PKCS7 structures containing multiple signers. Update smime 9851 application to support multiple signers.
|